Protecting Obfuscated Circuits Against Attacks That Utilize Test Infrastructures
a technology of test infrastructure and obfuscated circuit, applied in the field of semiconductor hardware data security and privacy, can solve the problems of ic overproduction, tampering, counterfeiting, etc., and achieve the effect of preventing ic overproduction, preventing counterfeiting, and preventing ic overproduction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015]FIG. 1 shows a hardware supply chain in a basic SoC design and verification process.
[0016]A SoC design and verification are assumed performed by a trusted entity shown in FIG. 1, e.g., the design house. The design house synthesizes the design based at least in part on a target technology library and integrates design-for-test (DFT) structures in order to improve testability. It then generates the physical layout and the Graphic Data System II (GDSII) version of the netlist and sends the GDSII file to an offshore IC foundry for mask fabrication. A foundry is assumed to be an untrusted entity that has access to the whole design data through the GDSII file. After the wafer fabrication, the silicon wafers go through wafer sort, packaging, testing and assembly, and then into distribution centers for product making. These remaining processes, e.g., packaging and testing, may be performed by untrusted entities such as foundries or assembly factories. However, in a tightly controlled ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


